Computer Networking On a VLSM network, which mask should you use on point-to-point WAN links in order to reduce the waste of IP addresses? /27 /29 /28 /30 /27 /29 /28 /30 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking If you wanted to delete the configuration stored in NVRAM, what would you type? erase running erase nvram erase startup delete nvram erase running erase nvram erase startup delete nvram ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Using the following illustration, what would be the IP address of E0 if you were using the eighth subnet? The network ID is 192.168.10.0/28 and you need to use the last available IP address in the range. The zero subnet should not be considered valid for this question. 192.168.10.66 192.168.10.142 192.168.10.126 192.168.100.254 192.168.10.143 192.168.10.66 192.168.10.142 192.168.10.126 192.168.100.254 192.168.10.143 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You are working with a network that has the network ID 192.168.10.0. What subnet should you use that supports up to 25 hosts and a maximum number of subnets? 255.255.255.248 255.255.255.224 255.255.255.192 255.255.255.240 255.255.255.252 255.255.255.248 255.255.255.224 255.255.255.192 255.255.255.240 255.255.255.252 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following TCP/IP protocol is used for transferring electronic mail messages from one machine to another? SNMP None of these SMTP FTP RPC SNMP None of these SMTP FTP RPC ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What does RIPv2 use to prevent routing loops?1. CIDR2. Split horizon3. Authentication4. Classless masking5. Holddown timers 2, 3 and 5 2 and 5 1 and 3 3 and 4 2, 3 and 5 2 and 5 1 and 3 3 and 4 ANSWER DOWNLOAD EXAMIANS APP